SW Security Type Casting Verification: Stopping an Emerging Attack Vector, Usenix Security Symposium (Security), August 2015
|
SW Security Understanding Malvertising Through Ad-Injecting Browser Extensions, International Conference on World Wide Web (WWW), May 2015
|
SW Security Preventing Use-after-free with Dangling Pointers Nullification, Network and Distributed System Security Symposium (NDSS), Feb 2015
|
SW Security From Zygote to Morula: Fortifying weakened ASLR on Android, IEEE Symposium on Security and Privacy (Oakland), May 2014
|
SW Security Protecting Location Privacy Using Location Semantics, ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), August 2011
|
SW Security binOb+: A Framework for Potent and Stealthy Binary Obfuscation, ACM Symposium on Information, Computer and Communications Security (ASIACCS), April 2010
|
SW Security Instruction-Level Data Isolation for the Kernel on ARM, Annual Design Automation Conference (DAC), Jun 2017
|
SW Security Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM, Network and Distributed System Security Symposium (NDSS), Feb 2017 (Acceptance rate: 16%)
|
SW Security A Survey and Design of a Scalable Mobile Edge Cloud Platform for the Smart IoT Devices and It’s Applications, International Conference on Computer Science and its Applications, 694-698, Nov 2016
|
SW Security Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices, USENIX Annual Technical Conference(ATC), Jun 2016 (Acceptance rate: 19%)
|